• Title/Summary/Keyword: The disable

Search Result 119, Processing Time 0.028 seconds

Effect of Lithium Bis(Oxalato)Borate Additive on Thermal Stability of Si Nanoparticle-based Anode (리튬 이차 전지용 실리콘 나노입자 음극의 고온 열안정성에 대한 Lithium bis(oxalato)borate첨가제의 효과)

  • Kim, Min-Jeong;Choi, Nam-Soon;Kim, Sung-Soo
    • Journal of the Korean Electrochemical Society
    • /
    • v.17 no.2
    • /
    • pp.79-85
    • /
    • 2014
  • Silicon (Si) has been investigated as promising negative-electrode (anode) materials because its theoretical specific capacity of 4200 mAh/g for $Li_{4.4}Si$ is far higher than that of carbonaceous anodes in current commercial products. However, in practice, the application of Si to Li-ion batteries is still quite challenging because Si suffers from severe volume expansion and contraction and lead to a continuous solid electrolyte interphase (SEI)-filming process by cracking of Si. This process consumes the limited $Li^+$ source, builds up thick and unstable SEI layer on the Si active materials, and will eventually disable the cell. Since unstable SEI reduces electrochemical performance and thermal stability of the Si anode, the surface chemistry of the anode should be modified by using a functional additive. It is found that lithium bis(oxalato)borate (LiBOB) as an additive effectively protected the Si anode surface, improved capacity retention when stored at $60^{\circ}C$, and alleviated exothermic thermal reactions of fully lithiated Si anode.

Accessibility Analysis of Android-based Smart Phones Targeted at People with Upper Limb Dysfunctions (상지기능 장애인을 대상으로 한 안드로이드 기반 스마트 폰의 입력 접근성 분석)

  • Kim, Kyung Sik;Song, Byung Seop
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.10 no.4
    • /
    • pp.267-272
    • /
    • 2016
  • In the era of ultra high speed information communication technology represented by Smart phone and Tablet PC, the disable and the aged people came to be in a position of so-called 'relatively weak people' in the field of information communication due to inconvenience of use and difference in information acquisition and processing ability. Thus, a survey was conducted on Smart phone accessibility items based on previous studies of the disabled with crippled disorder, brain lesions, myelopathy and muscular disabilities having more inconvenience relatively in their use of smart phone due to upper limb dysfunctions. Especially, people with upper limb dysfunctions with relatively weak grip had big inconvenience in the conditions of uses requiring actions such as grabbing and rotating the devices, and due to the characteristics of touch screen input method of Smart phone, they had big inconvenience due to a lack of a guidance for keyboard in input. As a result of questionnaires by the type of disability, it turned out that severe myelopathy causes the most inconvenience in using smart phone.

Development of Fitness Avatar Model for Increasing Physical Activity in Individual with Spinal Cord Injury (척수장애인 신체활동 증가를 위한 피트니스 아바타 모형 개발)

  • Kang, Sunyoung
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.65-70
    • /
    • 2014
  • The aim of this study is to suggest the fitness Avatar model for increasing physical activities in individuals with SCI(spinal cord injury). With the increasing of the disable, the ratio of individuals with SCI is also increasing. Avatar is a movable image that represents a person in a virtual reality environment or in cyberspace. With the expansion of new technology, such as video games and virtual reality, there has been an increase in the interest of using virtual reality in therapy. It is not easy for individuals with SCI to access tho sports facilities due to paraplegia. The increasing physical activities based on virtual reality will be the most innovative and future-oriented approach. First, building a system and establishing a comprehensive support system is essential to activate and spread variety of physical activities for individuals with SCI. Second, providing a appropriate feedback and identifying the effect of intervention will be considered.

Access Control using Secured Container-based Virtualization (보안 컨테이너 가상화 기반 접근 제어)

  • Jeong, Dong-hwa;Lee, Sunggyu;Shin, Youngsang;Park, Hyuncheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.330-334
    • /
    • 2017
  • Container-based virtualization reduces performance overhead compared with other virtualization technologies and guarantees an isolation of each virtual execution environment. So, it is being studied to block access to host resources or container resources for sandboxing in restricted system resource like embedded devices. However, because security threats which are caused by security vulnerabilities of the host OS or the security issues of the host environment exist, the needs of the technology to prevent an illegal accesses and unauthorized behaviors by malware has to be increased. In this paper, we define additional access permissions to access a virtual execution environment newly and control them in kernel space to protect attacks from illegal access and unauthorized behaviors by malware and suggest the Container Access Control to control them. Also, we suggest a way to block a loading of unauthenticated kernel driver to disable the Container Access Control running in host OS by malware. We implement and verify proposed technologies on Linux Kernel.

  • PDF

Website Design for Improving Web Accessibility of Disabled People (장애인의 웹 접근성 향상을 위한 웹사이트 설계)

  • Lee, Won-Kyung;Seo, Eun-Gyoung
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.1
    • /
    • pp.193-219
    • /
    • 2013
  • Public institutions or libraries urgently prepare comprehensive measures to improve web accessibility of their websites as booting web dependability and web utilization of disabled people. The purpose of this study is to propose the design guidelines for improving web accessibility of disabled people. The study, first, analyzed various web accessibility requirements based on web standards, web accessibility guidelines, and the related researches and proposed a web accessibility checklist with 42 requirement. Next, the study evaluated 15 websites of public institutions such as government departments, association of disabled people, and public libraries using the checklist. Finally, the study revealed non-adherence requirements and suggested website design guidelines in terms of contents configuration, sound, colour, keyboard handling, mouse handling, access, image processing, text processing, and code processing.

Analysis of Complications of Ambulatory General Anesthesia after Discharge in Patients Who are Taking Anticonvulsant (항경련제를 복용하고 있는 지적장애 환자의 외래전신마취 하 치과치료 후 합병증 발생 조사 연구)

  • Cha, Min-Joo;Seo, Kwang-Suk;Kim, Mi-Seon;Kim, Hyun-Jeong
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.14 no.2
    • /
    • pp.95-100
    • /
    • 2014
  • Background: About 60% of patients with epilepsy showed a variety of complications after returning home. The purpose of this study is to get further information and to help in the anesthetic management of the disable patients with epilepsy. Methods: After searching the outpatient anesthesia list of Seoul National University Dental Hospital clinic of the disabled from September 2010 to March 2012, we found total 83 patient cases who were taking antiepileptic drugs. A nurse of anethesiology department called to the patient's home after general anesthesia and got surveys with questionnaires form filled with complications at home. We enrolled total of 51 patients who agreed to participate this survey. And we also reviewed pre-anesthesia evaluation sheet, anesthesia record, and recovery and discharge record. Results: 11 of 51 (21.6%) patients had seizure convulsion at home within 1 weeks. 33.4% of patients who had at least once seizure attack per week had a seizure attack within 3 days. And 50% of once a month frequency patients had a seizure attack within 1 week. 33% of 1 - 3 seizure attacks per year patient group had a convulsion within 1 week. But there was no seizure attack within 1 week in whom had no seizure attack history during more than 1 year. Conclusions: After dental treatment, patient taking anticonvulsant have so many complications-especially seizure, more than we respected. We need more research about handle these problems.

Development of Personal Mobility Safety Driving Assistance System Using CNN-Based Object Detection and Boarding Detection Sensor (합성곱 신경망 기반 물체 인식과 탑승 감지 센서를 이용한 개인형 이동수단 주행 안전 보조 시스템 개발)

  • Son, Kwon Joong;Bae, Sung Hoon;Lee, Hyun June
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.211-218
    • /
    • 2021
  • A recent spread of personal mobility devices such as electric kickboards has brought about a rapid increase in accident cases. Such vehicles are susceptible to falling accidents due to their low dynamic stability and lack of outer protection chassis. This paper presents the development of an automatic emergency braking system and a safe starting system as driving assistance devices for electric kickboards. The braking system employed artificial intelligence to detect nearby threaening objects. The starting system was developed to disable powder to the motor until when the driver's boarding is confirmed. This study is meaningful in that it proposes the convergence technology of advanced driver assistance systems specialized for personal mobility devices.

Molecular cloning and characterization of novel human JNK2 (MAPK9) transcript variants that show different stimulation activities on AP-1

  • Wang, Pingzhang;Xiong, Ying;Ma, Chuan;Shi, Taiping;Ma, Dalong
    • BMB Reports
    • /
    • v.43 no.11
    • /
    • pp.738-743
    • /
    • 2010
  • The c-Jun $NH_2$-terminal kinase (JNK) signaling pathway participates in many physiological functions. In the current study we reported the cloning and characterization of five novel JNK2 transcript variants, which were designated as $JNK2\alpha3$, $JNK2\alpha4$, $JNK2\beta3$, $JNK2\gamma1$ and $JNK2\gamma2$, respectively. Among them, $JNK2\alpha4$ and $JNK2\gamma2$ are potential non-coding RNA because they contain pre-mature stop codons. Both $JNK2\alpha3$ and $JNK2\beta3$ contain an intact kinase domain, and both encode a protein product of 46 kDa, the same as those of $JNK2\alpha1$ and $JNK2\beta1$. $JNK2\gamma1$ contains a disrupted kinase domain and it showed a disable function. When over-expressed in mammalian cells, $JNK2\alpha3$ showed higher activity on AP-1 than that of $JNK2\beta3$ and $JNK2\gamma1$. Furthermore, $JNK2\alpha3$ and $JNK2\beta3$ showed different levels of substrate phosphorylation, although they both could promote the proliferation of 293T cells. Our results further demonstrate that JNK2 isoforms preferentially target different substrates and may regulate the expression of various target genes.

An Empirical Study on the Impact of Permission Smell in Android Applications

  • Wu, Zhiqiang;Lee, Hakjin;Lee, Scott Uk-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we proposed a sniffer to detect permission smells from developer and third-party libraries' code. Moreover, we conducted an empirical study to investigate unnecessary permissions on large real-world Android apps. Our analysis indicates that permission smell extensively exists in Android apps. According to the results, permission smells exist in most Android apps. In particular, third-party libraries request permission for functionalities that are not used by developers, which cause more smells. Moreover, most developers do not properly disable unnecessary permissions that are declared for third-party libraries. We discussed the impacts of permission smells on user experiences. As a result, the existence of permission smell does not impact the number of downloads. However, apps that have more unnecessary permissions have received lower ratings from users.

Study on HIPAA PHI application method to protect personal medical information in OMOP CDM construction (OMOP CDM 구축 시 개인의료정보 보호를 위한 HIPAA PHI 적용 방법 연구)

  • Kim, Hak-Ki;Jung, Eun-Young;Park, Dong-Kyun
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.66-76
    • /
    • 2017
  • In this study, we investigated how to protect personal healthcare information when constructing OMOP (Observational Medical Outcomes Partnership) CDM (Common Data Model). There are two proposed methods; to restrict data corresponding to HIPAA (Health Insurance Portability and Accountability Act) PHI (Protected Health Information) to be extracted to CDM or to disable identification of it. While processing sensitive information is restricted by Korean Personal Information Protection Act and medical law, there is no clear regulation about what is regarded as sensitive information. Therefore, it was difficult to select the sensitive information for protecting personal healthcare information. In order to solve this problem, we defined HIPAA PHI as restriction criterion of Article 23 of the Personal Information Protection Act and maps data corresponding to CDM data. Through this study, we expected that it will contribute to the spread of CDM construction in Korea as providing solutions to the problem of protection of personal healthcare information generated during CDM construction.